<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.7(1) introduced PBKDF2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3019479#M135476</link>
    <description>&lt;P&gt;ASA 9.7(1) introduced PBKDF2 hashing for local passwords.&lt;/P&gt;
&lt;TABLE cellpadding="3" cellspacing="0" width="100%" bordercolor="#808080" summary="" frame="hsides" border="1" rules="all"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" valign="top" width="28.57142857142857%" headers="d25e258 "&gt;
&lt;P&gt;PBKDF2 hashing for all local &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;username&lt;/SPAN&gt;&lt;/SPAN&gt; and&amp;nbsp;&lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;enable&lt;/SPAN&gt;&lt;/SPAN&gt; passwords&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="row-nocellborder" valign="top" width="71.42857142857143%" headers="d25e263 "&gt;
&lt;P&gt;Local &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;username&lt;/SPAN&gt;&lt;/SPAN&gt; and &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;enable&lt;/SPAN&gt;&lt;/SPAN&gt; passwords of all lengths are stored in the configuration using a PBKDF2 (Password-Based Key Derivation Function 2) hash. Previously, passwords 32 characters and shorter used the MD5-based hashing method. Already existing passwords continue to use the MD5-based hash unless you enter a new password. See the "Software and Configurations" chapter in the General Operations Configuration Guide for downgrading guidelines.&lt;/P&gt;
&lt;P&gt;We modified the following commands: &lt;STRONG&gt;enable password, username&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/security/asa/asa97/release/notes/asarn97.html&lt;/P&gt;
&lt;P&gt;You should also be using centralized authentication (which prevents use of local credentials unless there is no access to your AAA server) and restricting management access to the ASA to trusted interfaces (so that any attack would have to come from an insider vs. any random script launched against your public IP).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2017 08:11:38 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-05-17T08:11:38Z</dc:date>
    <item>
      <title>ASA5515X: md5 hash for local passwords</title>
      <link>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3019478#M135473</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;the CSO of our Company note that the Password localy saved in Firewall configuration are saved with a md5 hash.&lt;/P&gt;
&lt;P&gt;Serveral sites at the Internet provide the possibility to decrypt passwords encrypted with those unsecure hashing algorithems.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Firmware: Cisco Adaptive Security Appliance Software Version 9.5(3)6&lt;/P&gt;
&lt;P&gt;Hardware: ASA 5515-X with SW, 6 GE Data, 1 GE Mgmt, AC&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did find a hardeníng guide under&lt;/P&gt;
&lt;DIV style="text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: Tahoma; font-size: 10pt; font-style: normal; font-weight: normal; word-spacing: 0px; white-space: normal; direction: ltr;"&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;&lt;/DIV&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html" target="_blank"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-Cisco-ASA-Firewall.html&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;&lt;/DIV&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;This guide contains the following note:&lt;/DIV&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;"... ASA uses Message Digest 5 (MD5) for Password hashing."&lt;/DIV&gt;
&lt;DIV style="margin-top: 0px; margin-bottom: 0px;"&gt;Is there no possibilty to use secure hash algorithems such as SHA512 for Password hashes locally stored at the startup-config?&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;Holger Weinel&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3019478#M135473</guid>
      <dc:creator>holger.weinel1</dc:creator>
      <dc:date>2019-03-12T09:22:49Z</dc:date>
    </item>
    <item>
      <title>ASA 9.7(1) introduced PBKDF2</title>
      <link>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3019479#M135476</link>
      <description>&lt;P&gt;ASA 9.7(1) introduced PBKDF2 hashing for local passwords.&lt;/P&gt;
&lt;TABLE cellpadding="3" cellspacing="0" width="100%" bordercolor="#808080" summary="" frame="hsides" border="1" rules="all"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cellrowborder" valign="top" width="28.57142857142857%" headers="d25e258 "&gt;
&lt;P&gt;PBKDF2 hashing for all local &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;username&lt;/SPAN&gt;&lt;/SPAN&gt; and&amp;nbsp;&lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;enable&lt;/SPAN&gt;&lt;/SPAN&gt; passwords&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="row-nocellborder" valign="top" width="71.42857142857143%" headers="d25e263 "&gt;
&lt;P&gt;Local &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;username&lt;/SPAN&gt;&lt;/SPAN&gt; and &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;enable&lt;/SPAN&gt;&lt;/SPAN&gt; passwords of all lengths are stored in the configuration using a PBKDF2 (Password-Based Key Derivation Function 2) hash. Previously, passwords 32 characters and shorter used the MD5-based hashing method. Already existing passwords continue to use the MD5-based hash unless you enter a new password. See the "Software and Configurations" chapter in the General Operations Configuration Guide for downgrading guidelines.&lt;/P&gt;
&lt;P&gt;We modified the following commands: &lt;STRONG&gt;enable password, username&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/security/asa/asa97/release/notes/asarn97.html&lt;/P&gt;
&lt;P&gt;You should also be using centralized authentication (which prevents use of local credentials unless there is no access to your AAA server) and restricting management access to the ASA to trusted interfaces (so that any attack would have to come from an insider vs. any random script launched against your public IP).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 08:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3019479#M135476</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-17T08:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.7(1) introduced PBKDF2</title>
      <link>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3228150#M135478</link>
      <description>&lt;P&gt;I am trying to find out what SHA type that the PBDKF2 hashing is using for local password storage on the ASA's. I want to make sure that its a high level of encryption. I don't see this discussed in any documents. Anyone?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 19:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/3228150#M135478</guid>
      <dc:creator>blukens07</dc:creator>
      <dc:date>2017-12-06T19:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515X: md5 hash for local passwords</title>
      <link>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/4096912#M1070701</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following on in this thread I am encountering an interesting problem:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My newly created usernames have their passwords stored in the config as pbkdf2 passwords.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when I try to login via SSH using one of these new usernames I get "Access Denied" errors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In troubleshooting this problem I have copied the username config from another device using the "encrypted" flag on the password.&lt;/P&gt;&lt;P&gt;When using this "encrypted" username and it's associated password all works fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anybody else have any experience with this type of behavior?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 14:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515x-md5-hash-for-local-passwords/m-p/4096912#M1070701</guid>
      <dc:creator>williopoulos@gmail.com</dc:creator>
      <dc:date>2020-06-03T14:30:04Z</dc:date>
    </item>
  </channel>
</rss>

